S. No. |
Project Title |
Journal / Year |
Abstract |
Base Paper |
1 |
2DCrypt: Image Scaling and Cropping in Encrypted Domains |
IEEE 2016 |
|
|
2 |
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage |
IEEE 2016 |
|
|
3 |
A Locality Sensitive Low-Rank Model for Image Tag Completion |
IEEE 2016 |
|
|
4 |
A Shoulder Surfing Resistant Graphical Authentication System |
IEEE 2016 |
|
|
5 |
Aspect-level Influence Discovery from Graphs |
IEEE 2016 |
|
|
6 |
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information |
IEEE 2016 |
|
|
7 |
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy |
IEEE 2016 |
|
|
8 |
Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases |
IEEE 2016 |
|
|
9 |
Relevance Feedback Algorithms Inspired By Quantum Detection |
IEEE 2016 |
|
|
10 |
SecRBAC: Secure data in the Clouds |
IEEE 2016 |
|
|
11 |
D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data |
IEEE 2016 |
|
|
12 |
Where you are is who you are: User identification by matching statistics |
IEEE 2016 |
|
|
13 |
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud |
IEEE 2016 |
|
|
14 |
Efficiently Estimating Statistics of Points of Interests on Maps |
IEEE 2016 |
|
|
15 |
Sentiment Embeddings with Applications to Sentiment Analysis |
IEEE 2016 |
|
|
16 |
Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement |
IEEE 2016 |
|
|
17 |
Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing |
IEEE 2016 |
|
|
18 |
Encrypted Data Management with Deduplication in Cloud Computing |
IEEE 2016 |
|
|
19 |
Server-Aided Public Key Encryption with Keyword Search |
IEEE 2016 |
|
|
20 |
Social Friend Recommendation Based on Multiple Network Correlation |
IEEE 2016 |
|
|
21 |
From Latency, through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources |
IEEE 2016 |
|
|
22 |
Tag Based Image Search by Social Re-ranking |
IEEE 2016 |
|
|
23 |
Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search |
IEEE 2016 |
|
|
24 |
Mining High Utility Patterns in One Phase without Generating Candidates |
IEEE 2016 |
|
|
25 |
Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web |
IEEE 2016 |
|
|
26 |
Mining User-Aware Rare Sequential Topic Patterns in Document Streams |
IEEE 2016 |
|
|
27 |
Mitigating Cross-Site Scripting Attacks with a Content Security Policy |
IEEE 2016 |
|
|
28 |
Multi-Modal Event Topic Model for Social Event Analysis |
IEEE 2016 |
|
|
29 |
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement |
IEEE 2016 |
|
|
30 |
Trust Agent-Based Behavior Induction in Social Networks |
IEEE 2016 |
|
|
31 |
TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds |
IEEE 2016 |
|
|
32 |
Two-Factor Data Security Protection Mechanism for Cloud Storage System |
IEEE 2016 |
|
|
33 |
Uncertainty Analysis for the Keyword System of Web Events |
IEEE 2016 |
|
|
34 |
Understanding Deep Representations Learned in Modeling Users ‘Likes’ |
IEEE 2016 |
|
|